Please use this identifier to cite or link to this item: https://doi.org/10.1038/s41598-021-84291-w
DC FieldValue
dc.titleTraffic networks are vulnerable to disinformation attacks
dc.contributor.authorWaniek, Marcin
dc.contributor.authorRaman, Gururaghav
dc.contributor.authorAlShebli, Bedoor
dc.contributor.authorPeng, Jimmy Chih-Hsien
dc.contributor.authorRahwan, Talal
dc.date.accessioned2022-10-11T07:49:21Z
dc.date.available2022-10-11T07:49:21Z
dc.date.issued2021-03-05
dc.identifier.citationWaniek, Marcin, Raman, Gururaghav, AlShebli, Bedoor, Peng, Jimmy Chih-Hsien, Rahwan, Talal (2021-03-05). Traffic networks are vulnerable to disinformation attacks. Scientific Reports 11 (1) : 5329. ScholarBank@NUS Repository. https://doi.org/10.1038/s41598-021-84291-w
dc.identifier.issn2045-2322
dc.identifier.urihttps://scholarbank.nus.edu.sg/handle/10635/231961
dc.description.abstractDisinformation continues to raise concerns due to its increasing threat to society. Nevertheless, a threat of a disinformation-based attack on critical infrastructure is often overlooked. Here, we consider urban traffic networks and focus on fake information that manipulates drivers’ decisions to create congestion at a city scale. Specifically, we consider two complementary scenarios, one where drivers are persuaded to move towards a given location, and another where they are persuaded to move away from it. We study the optimization problem faced by the adversary when choosing which streets to target to maximize disruption. We prove that finding an optimal solution is computationally intractable, implying that the adversary has no choice but to settle for suboptimal heuristics. We analyze one such heuristic, and compare the cases when targets are spread across the city of Chicago vs. concentrated in its business district. Surprisingly, the latter results in more far-reaching disruption, with its impact felt as far as 2 km from the closest target. Our findings demonstrate that vulnerabilities in critical infrastructure may arise not only from hardware and software, but also from behavioral manipulation. © 2021, The Author(s).
dc.publisherNature Research
dc.rightsAttribution 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.sourceScopus OA2021
dc.typeArticle
dc.contributor.departmentELECTRICAL AND COMPUTER ENGINEERING
dc.description.doi10.1038/s41598-021-84291-w
dc.description.sourcetitleScientific Reports
dc.description.volume11
dc.description.issue1
dc.description.page5329
Appears in Collections:Elements
Staff Publications

Show simple item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
10_1038_s41598-021-84291-w.pdf3.59 MBAdobe PDF

OPEN

NoneView/Download

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons